Analysis Report New Order Request_0232147.exe

Overview

General Information

Sample Name: New Order Request_0232147.exe
Analysis ID: 404158
MD5: 5133cbc9db4989d6fbb350e0829911c8
SHA1: 72052feec6f9f94fe0831a77bdf8c3493d268e37
SHA256: fbdc2f9c6e970ae88ff30847c4d63472a0f0aa9b8e008e5b5c37f62ac526a963
Tags: AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

AV Detection:

barindex
Found malware configuration
Source: 0.2.New Order Request_0232147.exe.45ee328.3.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "calidad1@iruberritechnologies.comVpx7s4QHfJx7mail.iruberritechnologies.comrichardjortega@yandex.com"}
Multi AV Scanner detection for submitted file
Source: New Order Request_0232147.exe Virustotal: Detection: 14% Perma Link
Source: New Order Request_0232147.exe ReversingLabs: Detection: 17%
Antivirus or Machine Learning detection for unpacked file
Source: 5.2.New Order Request_0232147.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8

Compliance:

barindex
Uses 32bit PE files
Source: New Order Request_0232147.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: New Order Request_0232147.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Networking:

barindex
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.5:49730 -> 149.202.85.210:587
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: OVHFR OVHFR
Uses SMTP (mail sending)
Source: global traffic TCP traffic: 192.168.2.5:49730 -> 149.202.85.210:587
Source: unknown DNS traffic detected: queries for: mail.iruberritechnologies.com
Source: New Order Request_0232147.exe, 00000005.00000002.500811322.0000000002C51000.00000004.00000001.sdmp String found in binary or memory: http://127.0.0.1:HTTP/1.1
Source: New Order Request_0232147.exe, 00000005.00000002.500811322.0000000002C51000.00000004.00000001.sdmp String found in binary or memory: http://DynDns.comDynDNS
Source: New Order Request_0232147.exe, 00000005.00000002.500811322.0000000002C51000.00000004.00000001.sdmp String found in binary or memory: http://LPzxab.com
Source: New Order Request_0232147.exe, 00000005.00000002.503206058.0000000002F00000.00000004.00000001.sdmp String found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
Source: New Order Request_0232147.exe, 00000005.00000002.503206058.0000000002F00000.00000004.00000001.sdmp String found in binary or memory: http://cps.letsencrypt.org0
Source: New Order Request_0232147.exe, 00000005.00000002.503206058.0000000002F00000.00000004.00000001.sdmp String found in binary or memory: http://cps.root-x1.letsencrypt.org0
Source: New Order Request_0232147.exe, 00000005.00000002.503206058.0000000002F00000.00000004.00000001.sdmp String found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://fontfabrik.com
Source: New Order Request_0232147.exe, 00000005.00000002.503177096.0000000002EFA000.00000004.00000001.sdmp String found in binary or memory: http://iruberritechnologies.com
Source: New Order Request_0232147.exe, 00000005.00000002.503177096.0000000002EFA000.00000004.00000001.sdmp String found in binary or memory: http://mail.iruberritechnologies.com
Source: New Order Request_0232147.exe, 00000005.00000002.503206058.0000000002F00000.00000004.00000001.sdmp String found in binary or memory: http://r3.i.lencr.org/0?
Source: New Order Request_0232147.exe, 00000005.00000002.503206058.0000000002F00000.00000004.00000001.sdmp String found in binary or memory: http://r3.o.lencr.org0
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: New Order Request_0232147.exe, 00000000.00000003.237770203.000000000628E000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.com
Source: New Order Request_0232147.exe, 00000000.00000003.237770203.000000000628E000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comTC
Source: New Order Request_0232147.exe, 00000000.00000003.237770203.000000000628E000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comTCZ
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.carterandcone.coml
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com
Source: New Order Request_0232147.exe, 00000000.00000003.243298062.0000000006285000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/?
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers8
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers?
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designersG
Source: New Order Request_0232147.exe, 00000000.00000002.259475460.00000000019A7000.00000004.00000040.sdmp String found in binary or memory: http://www.fontbureau.comh
Source: New Order Request_0232147.exe, 00000000.00000002.259475460.00000000019A7000.00000004.00000040.sdmp String found in binary or memory: http://www.fontbureau.comion
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.fonts.com
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn
Source: New Order Request_0232147.exe, 00000000.00000003.234986480.0000000006288000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn(
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: New Order Request_0232147.exe, 00000000.00000003.234986480.0000000006288000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cnFYT/
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: New Order Request_0232147.exe, 00000000.00000003.242633271.0000000006285000.00000004.00000001.sdmp, New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.goodfont.co.kr
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: New Order Request_0232147.exe, 00000000.00000003.241640533.000000000628B000.00000004.00000001.sdmp String found in binary or memory: http://www.monotype.
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.com
Source: New Order Request_0232147.exe, 00000000.00000003.233482785.000000000629B000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comTF
Source: New Order Request_0232147.exe, 00000000.00000003.233482785.000000000629B000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comiv
Source: New Order Request_0232147.exe, 00000000.00000003.233482785.000000000629B000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comt
Source: New Order Request_0232147.exe, 00000000.00000003.237365971.0000000006286000.00000004.00000001.sdmp String found in binary or memory: http://www.sakkal.com
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.sandoll.co.kr
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.tiro.com
Source: New Order Request_0232147.exe, 00000000.00000003.235097752.0000000006288000.00000004.00000001.sdmp String found in binary or memory: http://www.tiro.com7
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.typography.netD
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.urwpp.deDPlease
Source: New Order Request_0232147.exe, 00000000.00000002.268539867.0000000006370000.00000002.00000001.sdmp String found in binary or memory: http://www.zhongyicts.com.cn
Source: New Order Request_0232147.exe, 00000005.00000002.500811322.0000000002C51000.00000004.00000001.sdmp String found in binary or memory: https://9TuO2oVE4tm8Yg0qRsK.org
Source: New Order Request_0232147.exe, 00000000.00000002.263302597.0000000004548000.00000004.00000001.sdmp, New Order Request_0232147.exe, 00000005.00000002.495432203.0000000000402000.00000040.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
Source: New Order Request_0232147.exe, 00000005.00000002.500811322.0000000002C51000.00000004.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

System Summary:

barindex
.NET source code contains very large array initializations
Source: 5.2.New Order Request_0232147.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bEAE24690u002d1E26u002d4B8Cu002dAA5Bu002d108B71A5B425u007d/u00333AA9EBEu002d6032u002d421Du002dA6B8u002d318DAED5CBB5.cs Large array initialization: .cctor: array initializer size 11983
Initial sample is a PE file and has a suspicious name
Source: initial sample Static PE information: Filename: New Order Request_0232147.exe
Detected potential crypto function
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_0578C43C 0_2_0578C43C
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_0578E4D0 0_2_0578E4D0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_0578E4C3 0_2_0578E4C3
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE26E0 0_2_07AE26E0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AEAE40 0_2_07AEAE40
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE5D30 0_2_07AE5D30
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE3540 0_2_07AE3540
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE1C88 0_2_07AE1C88
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE7CC8 0_2_07AE7CC8
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE8190 0_2_07AE8190
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE68E8 0_2_07AE68E8
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AEB0F0 0_2_07AEB0F0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE1018 0_2_07AE1018
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE0040 0_2_07AE0040
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE0FB7 0_2_07AE0FB7
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE86A0 0_2_07AE86A0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE5680 0_2_07AE5680
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE8690 0_2_07AE8690
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE26D0 0_2_07AE26D0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AEAE32 0_2_07AEAE32
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AEC600 0_2_07AEC600
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE5670 0_2_07AE5670
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE6D80 0_2_07AE6D80
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AEC5F0 0_2_07AEC5F0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE5D21 0_2_07AE5D21
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE2500 0_2_07AE2500
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE6D70 0_2_07AE6D70
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE04AA 0_2_07AE04AA
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE04B8 0_2_07AE04B8
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE7CB8 0_2_07AE7CB8
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE34D6 0_2_07AE34D6
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE7410 0_2_07AE7410
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE1C78 0_2_07AE1C78
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE4449 0_2_07AE4449
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE4458 0_2_07AE4458
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE73F6 0_2_07AE73F6
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AEAB68 0_2_07AEAB68
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AEAB78 0_2_07AEAB78
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE5B40 0_2_07AE5B40
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE52E8 0_2_07AE52E8
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE52F8 0_2_07AE52F8
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE58A0 0_2_07AE58A0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE68BD 0_2_07AE68BD
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE5890 0_2_07AE5890
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AEB0E0 0_2_07AEB0E0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE0006 0_2_07AE0006
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE6879 0_2_07AE6879
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00F92D50 5_2_00F92D50
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00F9F210 5_2_00F9F210
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00F91FEF 5_2_00F91FEF
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00F92768 5_2_00F92768
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FF0AC4 5_2_00FF0AC4
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FF3285 5_2_00FF3285
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FF5B60 5_2_00FF5B60
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FFC5D0 5_2_00FFC5D0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FF9198 5_2_00FF9198
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FFBEE0 5_2_00FFBEE0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FF5EA8 5_2_00FF5EA8
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FFC670 5_2_00FFC670
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_01050040 5_2_01050040
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_010543F0 5_2_010543F0
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_01053248 5_2_01053248
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_01054A75 5_2_01054A75
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_01058F40 5_2_01058F40
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_0105B790 5_2_0105B790
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_0105E567 5_2_0105E567
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_01059788 5_2_01059788
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_01059688 5_2_01059688
Sample file is different than original file name gathered from version info
Source: New Order Request_0232147.exe, 00000000.00000002.262301254.00000000042A9000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameMajorRevision.exe< vs New Order Request_0232147.exe
Source: New Order Request_0232147.exe, 00000000.00000002.258139630.0000000001002000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameqGOldQU8bPo4VOD.exeR vs New Order Request_0232147.exe
Source: New Order Request_0232147.exe, 00000000.00000002.263302597.0000000004548000.00000004.00000001.sdmp Binary or memory string: OriginalFilenamempUIbZUCJJtYBvJwTrRUyqOpjFnkxPklNCt.exe4 vs New Order Request_0232147.exe
Source: New Order Request_0232147.exe, 00000000.00000002.259621608.00000000032A1000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameSmartFormat.dll8 vs New Order Request_0232147.exe
Source: New Order Request_0232147.exe, 00000004.00000000.254603815.00000000002E2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameqGOldQU8bPo4VOD.exeR vs New Order Request_0232147.exe
Source: New Order Request_0232147.exe, 00000005.00000000.256547687.0000000000962000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameqGOldQU8bPo4VOD.exeR vs New Order Request_0232147.exe
Source: New Order Request_0232147.exe, 00000005.00000002.497098410.0000000000CF8000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameUNKNOWN_FILET vs New Order Request_0232147.exe
Source: New Order Request_0232147.exe, 00000005.00000002.505433369.0000000006030000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamemscorrc.dllT vs New Order Request_0232147.exe
Source: New Order Request_0232147.exe, 00000005.00000002.495432203.0000000000402000.00000040.00000001.sdmp Binary or memory string: OriginalFilenamempUIbZUCJJtYBvJwTrRUyqOpjFnkxPklNCt.exe4 vs New Order Request_0232147.exe
Source: New Order Request_0232147.exe Binary or memory string: OriginalFilenameqGOldQU8bPo4VOD.exeR vs New Order Request_0232147.exe
Uses 32bit PE files
Source: New Order Request_0232147.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 5.2.New Order Request_0232147.exe.400000.0.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 5.2.New Order Request_0232147.exe.400000.0.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@5/1@6/1
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New Order Request_0232147.exe.log Jump to behavior
Source: New Order Request_0232147.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\New Order Request_0232147.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: New Order Request_0232147.exe Binary or memory string: SELECT DoctorId FROM PatientDoctor WHERE PatientId = {0};
Source: New Order Request_0232147.exe Binary or memory string: SELECT * FROM Patients a INNER JOIN PatientDoctor b ON a.Id = b.PatientId WHERE b.DoctorId = {0} ORDER BY LastName;
Source: New Order Request_0232147.exe, 00000000.00000000.230290906.0000000000F02000.00000002.00020000.sdmp, New Order Request_0232147.exe, 00000004.00000002.256253349.00000000001E2000.00000002.00020000.sdmp, New Order Request_0232147.exe, 00000005.00000002.495906591.0000000000862000.00000002.00020000.sdmp Binary or memory string: SELECT * FROM Patients a INNER JOIN PatientDoctor b ON a.Id = b.PatientId WHERE b.DoctorId = {0} ORDER BY LastName;oSELECT COUNT(*) FROM PatientDoctor WHERE DoctorId = {0}sSELECT DoctorId FROM PatientDoctor WHERE PatientId = {0};
Source: New Order Request_0232147.exe Virustotal: Detection: 14%
Source: New Order Request_0232147.exe ReversingLabs: Detection: 17%
Source: New Order Request_0232147.exe String found in binary or memory: Administrators/addNewToolStripMenuItem
Source: unknown Process created: C:\Users\user\Desktop\New Order Request_0232147.exe 'C:\Users\user\Desktop\New Order Request_0232147.exe'
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process created: C:\Users\user\Desktop\New Order Request_0232147.exe {path}
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process created: C:\Users\user\Desktop\New Order Request_0232147.exe {path}
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process created: C:\Users\user\Desktop\New Order Request_0232147.exe {path} Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process created: C:\Users\user\Desktop\New Order Request_0232147.exe {path} Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: New Order Request_0232147.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: New Order Request_0232147.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: New Order Request_0232147.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

Data Obfuscation:

barindex
Binary contains a suspicious time stamp
Source: New Order Request_0232147.exe Static PE information: 0xF0C0A264 [Sun Dec 29 11:52:04 2097 UTC]
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE2F05 push ds; ret 0_2_07AE2F08
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE65EB push ecx; retf 0_2_07AE65EC
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AEC4CA push ebp; ret 0_2_07AEC4CD
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 0_2_07AE8182 push esp; retf 0_2_07AE8189
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00F954F0 pushfd ; ret 5_2_00F9561E
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00F9E6B0 pushfd ; ret 5_2_00F9E6D1
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00F97A37 push edi; retn 0000h 5_2_00F97A39
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00F9FB98 pushfd ; ret 5_2_00F9FDE6
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FF912D push fs; iretd 5_2_00FF912F
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_00FF0650 push 99BC00D7h; ret 5_2_00FF06E6
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_013CDEEF push C802C3C1h; ret 5_2_013CDF6A
Source: initial sample Static PE information: section name: .text entropy: 7.17013687848

Hooking and other Techniques for Hiding and Protection:

barindex
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Yara detected AntiVM3
Source: Yara match File source: Process Memory Space: New Order Request_0232147.exe PID: 6368, type: MEMORY
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: WINE_GET_UNIX_FILE_NAME
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: SBIEDLL.DLL
Contains long sleeps (>= 3 min)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Window / User API: threadDelayed 3749 Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Window / User API: threadDelayed 6072 Jump to behavior
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\New Order Request_0232147.exe TID: 6372 Thread sleep time: -31500s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe TID: 6392 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe TID: 5480 Thread sleep time: -19369081277395017s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe TID: 5476 Thread sleep count: 3749 > 30 Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe TID: 5476 Thread sleep count: 6072 > 30 Jump to behavior
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\New Order Request_0232147.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Thread delayed: delay time: 31500 Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: vmware
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: VMWARE
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: VMware SVGA II
Source: New Order Request_0232147.exe, 00000000.00000002.259851454.00000000032E5000.00000004.00000001.sdmp Binary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Code function: 5_2_01050040 LdrInitializeThunk, 5_2_01050040
Enables debug privileges
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Memory written: C:\Users\user\Desktop\New Order Request_0232147.exe base: 400000 value starts with: 4D5A Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process created: C:\Users\user\Desktop\New Order Request_0232147.exe {path} Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Process created: C:\Users\user\Desktop\New Order Request_0232147.exe {path} Jump to behavior
Source: New Order Request_0232147.exe, 00000005.00000002.500108767.0000000001630000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: New Order Request_0232147.exe, 00000005.00000002.500108767.0000000001630000.00000002.00000001.sdmp Binary or memory string: Progman
Source: New Order Request_0232147.exe, 00000005.00000002.500108767.0000000001630000.00000002.00000001.sdmp Binary or memory string: SProgram Managerl
Source: New Order Request_0232147.exe, 00000005.00000002.500108767.0000000001630000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd,
Source: New Order Request_0232147.exe, 00000005.00000002.500108767.0000000001630000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Users\user\Desktop\New Order Request_0232147.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Users\user\Desktop\New Order Request_0232147.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected AgentTesla
Source: Yara match File source: 00000000.00000002.263302597.0000000004548000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.495432203.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: New Order Request_0232147.exe PID: 6368, type: MEMORY
Source: Yara match File source: Process Memory Space: New Order Request_0232147.exe PID: 6604, type: MEMORY
Source: Yara match File source: 0.2.New Order Request_0232147.exe.45ee328.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.New Order Request_0232147.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.New Order Request_0232147.exe.45ee328.3.unpack, type: UNPACKEDPE
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Tries to harvest and steal browser information (history, passwords, etc)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Tries to harvest and steal ftp login credentials
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\ Jump to behavior
Tries to steal Mail credentials (via file access)
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: C:\Users\user\Desktop\New Order Request_0232147.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Yara detected Credential Stealer
Source: Yara match File source: 00000005.00000002.500811322.0000000002C51000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: New Order Request_0232147.exe PID: 6604, type: MEMORY

Remote Access Functionality:

barindex
Yara detected AgentTesla
Source: Yara match File source: 00000000.00000002.263302597.0000000004548000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.495432203.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: New Order Request_0232147.exe PID: 6368, type: MEMORY
Source: Yara match File source: Process Memory Space: New Order Request_0232147.exe PID: 6604, type: MEMORY
Source: Yara match File source: 0.2.New Order Request_0232147.exe.45ee328.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.New Order Request_0232147.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.New Order Request_0232147.exe.45ee328.3.unpack, type: UNPACKEDPE
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 404158 Sample: New Order Request_0232147.exe Startdate: 04/05/2021 Architecture: WINDOWS Score: 100 22 Found malware configuration 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected AgentTesla 2->26 28 6 other signatures 2->28 6 New Order Request_0232147.exe 3 2->6         started        process3 file4 16 C:\...16ew Order Request_0232147.exe.log, ASCII 6->16 dropped 30 Injects a PE file into a foreign processes 6->30 10 New Order Request_0232147.exe 2 6->10         started        14 New Order Request_0232147.exe 6->14         started        signatures5 process6 dnsIp7 18 iruberritechnologies.com 149.202.85.210, 49730, 587 OVHFR France 10->18 20 mail.iruberritechnologies.com 10->20 32 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 10->32 34 Tries to steal Mail credentials (via file access) 10->34 36 Tries to harvest and steal ftp login credentials 10->36 38 Tries to harvest and steal browser information (history, passwords, etc) 10->38 signatures8
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
149.202.85.210
iruberritechnologies.com France
16276 OVHFR true

Contacted Domains

Name IP Active
iruberritechnologies.com 149.202.85.210 true
mail.iruberritechnologies.com unknown unknown